Questions
As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:
- If I suspected a data exfiltration event was occurring using an "unknown" TLS version to a specific country, which tool should I use to find what internal hosts were affected?
- If you know that you have a large contingent of Windows client machines using the PuTTY SSH client, how could you inventory those without searching each machine's local storage?
- Why would you decide to place an IPS on the inside network or the actual firewall?